From 077aa39db9a421e073678790b7ff379a33159c03 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 13 Jun 2025 02:03:56 +0000 Subject: [PATCH] Auto-Update: 2025-06-13T02:00:20.569928+00:00 --- CVE-2021/CVE-2021-205xx/CVE-2021-20587.json | 58 +++++++++----- CVE-2021/CVE-2021-205xx/CVE-2021-20588.json | 50 ++++++++---- CVE-2024/CVE-2024-307xx/CVE-2024-30799.json | 56 +++++++++++++- CVE-2024/CVE-2024-405xx/CVE-2024-40553.json | 31 +++++++- CVE-2024/CVE-2024-405xx/CVE-2024-40554.json | 31 +++++++- CVE-2024/CVE-2024-405xx/CVE-2024-40555.json | 43 ++++++++++- CVE-2024/CVE-2024-405xx/CVE-2024-40560.json | 32 +++++++- CVE-2024/CVE-2024-462xx/CVE-2024-46213.json | 39 +++++++++- CVE-2024/CVE-2024-480xx/CVE-2024-48052.json | 33 +++++++- CVE-2024/CVE-2024-482xx/CVE-2024-48241.json | 40 ++++++++-- CVE-2024/CVE-2024-489xx/CVE-2024-48900.json | 38 +++++++++- CVE-2024/CVE-2024-49xx/CVE-2024-4977.json | 46 ++++++++++- CVE-2024/CVE-2024-506xx/CVE-2024-50677.json | 32 +++++++- CVE-2024/CVE-2024-67xx/CVE-2024-6766.json | 40 +++++++++- CVE-2025/CVE-2025-42xx/CVE-2025-4228.json | 78 +++++++++++++++++++ CVE-2025/CVE-2025-42xx/CVE-2025-4230.json | 78 +++++++++++++++++++ CVE-2025/CVE-2025-42xx/CVE-2025-4231.json | 78 +++++++++++++++++++ CVE-2025/CVE-2025-42xx/CVE-2025-4232.json | 78 +++++++++++++++++++ CVE-2025/CVE-2025-55xx/CVE-2025-5593.json | 84 +++++++++++++++++++-- CVE-2025/CVE-2025-55xx/CVE-2025-5594.json | 82 ++++++++++++++++++-- README.md | 43 ++++++----- _state.csv | 58 +++++++------- 22 files changed, 1010 insertions(+), 138 deletions(-) create mode 100644 CVE-2025/CVE-2025-42xx/CVE-2025-4228.json create mode 100644 CVE-2025/CVE-2025-42xx/CVE-2025-4230.json create mode 100644 CVE-2025/CVE-2025-42xx/CVE-2025-4231.json create mode 100644 CVE-2025/CVE-2025-42xx/CVE-2025-4232.json diff --git a/CVE-2021/CVE-2021-205xx/CVE-2021-20587.json b/CVE-2021/CVE-2021-205xx/CVE-2021-20587.json index 151335cca08..14124d9d46f 100644 --- a/CVE-2021/CVE-2021-205xx/CVE-2021-20587.json +++ b/CVE-2021/CVE-2021-205xx/CVE-2021-20587.json @@ -2,13 +2,13 @@ "id": "CVE-2021-20587", "sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "published": "2021-02-19T20:15:12.833", - "lastModified": "2024-11-21T05:46:49.637", + "lastModified": "2025-06-13T00:15:20.230", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Heap-based buffer overflow vulnerability in Mitsubishi Electric FA Engineering Software (CPU Module Logging Configuration Tool versions 1.112R and prior, CW Configurator versions 1.011M and prior, Data Transfer versions 3.44W and prior, EZSocket versions 5.4 and prior, FR Configurator all versions, FR Configurator SW3 all versions, FR Configurator2 versions 1.24A and prior, GT Designer3 Version1(GOT1000) versions 1.250L and prior, GT Designer3 Version1(GOT2000) versions 1.250L and prior, GT SoftGOT1000 Version3 versions 3.245F and prior, GT SoftGOT2000 Version1 versions 1.250L and prior, GX Configurator-DP versions 7.14Q and prior, GX Configurator-QP all versions, GX Developer versions 8.506C and prior, GX Explorer all versions, GX IEC Developer all versions, GX LogViewer versions 1.115U and prior, GX RemoteService-I all versions, GX Works2 versions 1.597X and prior, GX Works3 versions 1.070Y and prior, iQ Monozukuri ANDON (Data Transfer) all versions, iQ Monozukuri Process Remote Monitoring (Data Transfer) all versions, M_CommDTM-HART all versions, M_CommDTM-IO-Link versions 1.03D and prior, MELFA-Works versions 4.4 and prior, MELSEC WinCPU Setting Utility all versions, MELSOFT EM Software Development Kit (EM Configurator) versions 1.015R and prior, MELSOFT Navigator versions 2.74C and prior, MH11 SettingTool Version2 versions 2.004E and prior, MI Configurator versions 1.004E and prior, MT Works2 versions 1.167Z and prior, MX Component versions 5.001B and prior, Network Interface Board CC IE Control utility versions 1.29F and prior, Network Interface Board CC IE Field Utility versions 1.16S and prior, Network Interface Board CC-Link Ver.2 Utility versions 1.23Z and prior, Network Interface Board MNETH utility versions 34L and prior, PX Developer versions 1.53F and prior, RT ToolBox2 versions 3.73B and prior, RT ToolBox3 versions 1.82L and prior, Setting/monitoring tools for the C Controller module (SW4PVC-CCPU) versions 4.12N and prior and SLMP Data Collector versions 1.04E and prior) allows a remote unauthenticated attacker to cause a DoS condition of the software products, and possibly to execute a malicious program on the personal computer running the software products although it has not been reproduced, by spoofing MELSEC, GOT or FREQROL and returning crafted reply packets." + "value": "Heap-based buffer overflow vulnerability in Mitsubishi Electric FA Engineering Software (CPU Module Logging Configuration Tool versions 1.112R and prior, CW Configurator versions 1.011M and prior, Data Transfer versions 3.44W and prior, EZSocket versions 5.4 and prior, FR Configurator all versions, FR Configurator SW3 all versions, FR Configurator2 versions 1.24A and prior, GT Designer3 Version1(GOT1000) versions 1.250L and prior, GT Designer3 Version1(GOT2000) versions 1.250L and prior, GT SoftGOT1000 Version3 versions 3.245F and prior, GT SoftGOT2000 Version1 versions 1.250L and prior, GX Configurator-DP versions 7.14Q and prior, GX Configurator-QP all versions, GX Developer versions 8.506C and prior, GX Explorer all versions, GX IEC Developer all versions, GX LogViewer versions 1.115U and prior, GX RemoteService-I all versions, GX Works2 versions 1.597X and prior, GX Works3 versions 1.070Y and prior, iQ Monozukuri ANDON (Data Transfer) versions 1.003D and prior, iQ Monozukuri Process Remote Monitoring (Data Transfer) versions 1.002C and prior, M_CommDTM-HART all versions, M_CommDTM-IO-Link versions 1.03D and prior, MELFA-Works versions 4.4 and prior, MELSEC WinCPU Setting Utility all versions, MELSOFT EM Software Development Kit (EM Configurator) versions 1.015R and prior, MELSOFT Navigator versions 2.74C and prior, MH11 SettingTool Version2 versions 2.004E and prior, MI Configurator versions 1.004E and prior, MT Works2 versions 1.167Z and prior, MX Component versions 5.001B and prior, Network Interface Board CC IE Control utility versions 1.29F and prior, Network Interface Board CC IE Field Utility versions 1.16S and prior, Network Interface Board CC-Link Ver.2 Utility versions 1.23Z and prior, Network Interface Board MNETH utility versions 34L and prior, PX Developer versions 1.53F and prior, RT ToolBox2 versions 3.73B and prior, RT ToolBox3 versions 1.82L and prior, Setting/monitoring tools for the C Controller module (SW4PVC-CCPU) versions 4.12N and prior, and SLMP Data Collector versions 1.04E and prior) allows a remote unauthenticated attacker to cause a DoS condition on the software products, and possibly to execute a malicious code on the personal computer running the software products although it has not been reproduced, by spoofing MELSEC, GOT or FREQROL and returning crafted reply packets." }, { "lang": "es", @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "nvd@nist.gov", "type": "Primary", @@ -66,8 +86,18 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", "description": [ { "lang": "en", @@ -316,26 +346,16 @@ ], "references": [ { - "url": "https://jvn.jp/vu/JVNVU92330101/index.html", - "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", - "tags": [ - "Third Party Advisory" - ] + "url": "https://jvn.jp/vu/JVNVU92330101", + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" }, { - "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-049-02", - "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", - "tags": [ - "Third Party Advisory", - "US Government Resource" - ] + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-049-02", + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" }, { - "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-021_en.pdf", - "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", - "tags": [ - "Vendor Advisory" - ] + "url": "https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2020-021_en.pdf", + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" }, { "url": "https://jvn.jp/vu/JVNVU92330101/index.html", diff --git a/CVE-2021/CVE-2021-205xx/CVE-2021-20588.json b/CVE-2021/CVE-2021-205xx/CVE-2021-20588.json index e76f9e1b697..ac46e15ce31 100644 --- a/CVE-2021/CVE-2021-205xx/CVE-2021-20588.json +++ b/CVE-2021/CVE-2021-205xx/CVE-2021-20588.json @@ -2,13 +2,13 @@ "id": "CVE-2021-20588", "sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "published": "2021-02-19T20:15:13.023", - "lastModified": "2024-11-21T05:46:49.790", + "lastModified": "2025-06-13T00:15:22.797", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Improper handling of length parameter inconsistency vulnerability in Mitsubishi Electric FA Engineering Software(CPU Module Logging Configuration Tool versions 1.112R and prior, CW Configurator versions 1.011M and prior, Data Transfer versions 3.44W and prior, EZSocket versions 5.4 and prior, FR Configurator all versions, FR Configurator SW3 all versions, FR Configurator2 versions 1.24A and prior, GT Designer3 Version1(GOT1000) versions 1.250L and prior, GT Designer3 Version1(GOT2000) versions 1.250L and prior, GT SoftGOT1000 Version3 versions 3.245F and prior, GT SoftGOT2000 Version1 versions 1.250L and prior, GX Configurator-DP versions 7.14Q and prior, GX Configurator-QP all versions, GX Developer versions 8.506C and prior, GX Explorer all versions, GX IEC Developer all versions, GX LogViewer versions 1.115U and prior, GX RemoteService-I all versions, GX Works2 versions 1.597X and prior, GX Works3 versions 1.070Y and prior, iQ Monozukuri ANDON (Data Transfer) all versions, iQ Monozukuri Process Remote Monitoring (Data Transfer) all versions, M_CommDTM-HART all versions, M_CommDTM-IO-Link versions 1.03D and prior, MELFA-Works versions 4.4 and prior, MELSEC WinCPU Setting Utility all versions, MELSOFT EM Software Development Kit (EM Configurator) versions 1.015R and prior, MELSOFT Navigator versions 2.74C and prior, MH11 SettingTool Version2 versions 2.004E and prior, MI Configurator versions 1.004E and prior, MT Works2 versions 1.167Z and prior, MX Component versions 5.001B and prior, Network Interface Board CC IE Control utility versions 1.29F and prior, Network Interface Board CC IE Field Utility versions 1.16S and prior, Network Interface Board CC-Link Ver.2 Utility versions 1.23Z and prior, Network Interface Board MNETH utility versions 34L and prior, PX Developer versions 1.53F and prior, RT ToolBox2 versions 3.73B and prior, RT ToolBox3 versions 1.82L and prior, Setting/monitoring tools for the C Controller module (SW4PVC-CCPU) versions 4.12N and prior and SLMP Data Collector versions 1.04E and prior) allows a remote unauthenticated attacker to cause a DoS condition of the software products, and possibly to execute a malicious program on the personal computer running the software products although it has not been reproduced, by spoofing MELSEC, GOT or FREQROL and returning crafted reply packets." + "value": "Improper Handling of Length Parameter Inconsistency vulnerability in Mitsubishi Electric FA Engineering Software (CPU Module Logging Configuration Tool versions 1.112R and prior, CW Configurator versions 1.011M and prior, Data Transfer versions 3.44W and prior, EZSocket versions 5.4 and prior, FR Configurator all versions, FR Configurator SW3 all versions, FR Configurator2 versions 1.24A and prior, GT Designer3 Version1(GOT1000) versions 1.250L and prior, GT Designer3 Version1(GOT2000) versions 1.250L and prior, GT SoftGOT1000 Version3 versions 3.245F and prior, GT SoftGOT2000 Version1 versions 1.250L and prior, GX Configurator-DP versions 7.14Q and prior, GX Configurator-QP all versions, GX Developer versions 8.506C and prior, GX Explorer all versions, GX IEC Developer all versions, GX LogViewer versions 1.115U and prior, GX RemoteService-I all versions, GX Works2 versions 1.597X and prior, GX Works3 versions 1.070Y and prior, iQ Monozukuri ANDON (Data Transfer) versions 1.003D and prior, iQ Monozukuri Process Remote Monitoring (Data Transfer) versions 1.002C and prior, M_CommDTM-HART all versions, M_CommDTM-IO-Link versions 1.03D and prior, MELFA-Works versions 4.4 and prior, MELSEC WinCPU Setting Utility all versions, MELSOFT EM Software Development Kit (EM Configurator) versions 1.015R and prior, MELSOFT Navigator versions 2.74C and prior, MH11 SettingTool Version2 versions 2.004E and prior, MI Configurator versions 1.004E and prior, MT Works2 versions 1.167Z and prior, MX Component versions 5.001B and prior, Network Interface Board CC IE Control utility versions 1.29F and prior, Network Interface Board CC IE Field Utility versions 1.16S and prior, Network Interface Board CC-Link Ver.2 Utility versions 1.23Z and prior, Network Interface Board MNETH utility versions 34L and prior, PX Developer versions 1.53F and prior, RT ToolBox2 versions 3.73B and prior, RT ToolBox3 versions 1.82L and prior, Setting/monitoring tools for the C Controller module (SW4PVC-CCPU) versions 4.12N and prior, and SLMP Data Collector versions 1.04E and prior) allows a remote unauthenticated attacker to cause a DoS condition on the software products, and possibly to execute a malicious code on the personal computer running the software products although it has not been reproduced, by spoofing MELSEC, GOT or FREQROL and returning crafted reply packets." }, { "lang": "es", @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "nvd@nist.gov", "type": "Primary", @@ -66,8 +86,18 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-130" + } + ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", "description": [ { "lang": "en", @@ -316,22 +346,16 @@ ], "references": [ { - "url": "https://jvn.jp/vu/JVNVU92330101/index.html", - "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", - "tags": [ - "Third Party Advisory" - ] + "url": "https://jvn.jp/vu/JVNVU92330101", + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" }, { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-049-02", "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" }, { - "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-021_en.pdf", - "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", - "tags": [ - "Vendor Advisory" - ] + "url": "https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2020-021_en.pdf", + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" }, { "url": "https://jvn.jp/vu/JVNVU92330101/index.html", diff --git a/CVE-2024/CVE-2024-307xx/CVE-2024-30799.json b/CVE-2024/CVE-2024-307xx/CVE-2024-30799.json index 3441a975ea0..3b02bf3e44f 100644 --- a/CVE-2024/CVE-2024-307xx/CVE-2024-30799.json +++ b/CVE-2024/CVE-2024-307xx/CVE-2024-30799.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30799", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T01:15:47.340", - "lastModified": "2024-11-22T19:15:06.147", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-12T23:57:54.350", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +71,42 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dronecode:px4_drone_autopilot:*:-:*:*:*:*:*:*", + "versionEndIncluding": "1.14.0", + "matchCriteriaId": "A79109AD-F542-464E-966C-D63AA3C9EFE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/PX4/PX4-Autopilot/issues/22428", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/PX4/PX4-Autopilot/issues/22428", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40553.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40553.json index e066ffe60bd..42aa5994e83 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40553.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40553.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40553", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-15T16:15:03.147", - "lastModified": "2024-11-21T09:31:18.923", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-13T00:04:08.850", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:project_team:tmall_demo:2024-07-03:*:*:*:*:*:*:*", + "matchCriteriaId": "176324F3-942B-42FA-9456-63FCAE6C3AF1" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/project_team/Tmall_demo/issues/IAANVC", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://gitee.com/project_team/Tmall_demo/issues/IAANVC", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40554.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40554.json index 7db9ddd3ebc..56bf9d3335a 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40554.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40554.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40554", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-15T16:15:03.223", - "lastModified": "2024-11-21T09:31:19.117", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-13T00:06:59.700", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:project_team:tmall_demo:2024-07-03:*:*:*:*:*:*:*", + "matchCriteriaId": "176324F3-942B-42FA-9456-63FCAE6C3AF1" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/project_team/Tmall_demo/issues/IAANYB", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://gitee.com/project_team/Tmall_demo/issues/IAANYB", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40555.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40555.json index d8cd33e0874..3b1b3458c31 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40555.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40555.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40555", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-15T16:15:03.283", - "lastModified": "2024-11-22T19:15:06.943", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-13T00:08:19.140", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,49 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:project_team:tmall_demo:2024-07-03:*:*:*:*:*:*:*", + "matchCriteriaId": "176324F3-942B-42FA-9456-63FCAE6C3AF1" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/project_team/Tmall_demo/issues/IAAO1T", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://gitee.com/project_team/Tmall_demo/issues/IAAO1T", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40560.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40560.json index 0fa83fbf066..560938bf835 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40560.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40560.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40560", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-15T16:15:03.347", - "lastModified": "2024-11-21T09:31:19.433", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-13T00:14:13.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:project_team:tmall_demo:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024-07-03", + "matchCriteriaId": "7FDC0F03-8FF0-49CE-B503-51AF1119B344" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/project_team/Tmall_demo/issues/IAAOT1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://gitee.com/project_team/Tmall_demo/issues/IAAOT1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-462xx/CVE-2024-46213.json b/CVE-2024/CVE-2024-462xx/CVE-2024-46213.json index 779dd22cb5e..5ef7eb3b7ad 100644 --- a/CVE-2024/CVE-2024-462xx/CVE-2024-46213.json +++ b/CVE-2024/CVE-2024-462xx/CVE-2024-46213.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46213", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-16T21:15:12.947", - "lastModified": "2024-10-18T12:53:04.627", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-13T00:28:54.280", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,43 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redaxo:redaxo:2.11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "391C22A0-B15A-4A3A-A6FD-ECB6B3344A88" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Purposex7/Vulns4Study/blob/main/REDAXO%20Cronjobs%20%20AddOns%20RCE.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48052.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48052.json index f35ad259a5e..4eb97dcc1b9 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48052.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48052.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48052", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-04T23:15:04.337", - "lastModified": "2024-11-06T20:35:29.830", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-13T00:21:58.573", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:python:*:*", + "versionEndIncluding": "4.42.0", + "matchCriteriaId": "C7A81F18-50C6-4DFF-A396-A479DF256198" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/AfterSnows/45ffc23797f9127e00755376cc610e12", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://rumbling-slice-eb0.notion.site/FULL-SSRF-in-gr-DownloadButton-in-gradio-app-gradio-870b21e0908b48cbafd914719ac1a4e6?pvs=4", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48241.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48241.json index ab596c60c2b..d87f747159d 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48241.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48241.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48241", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T18:15:07.490", - "lastModified": "2024-11-01T12:57:03.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-13T00:24:27.273", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,48 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.8.0", + "versionEndIncluding": "5.9.4", + "matchCriteriaId": "E0CC14C5-C9E0-46A6-9D94-522D1BD39942" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/St-Andrews-Bug-Busters/Vuln_info/blob/main/radare2/CVE-2024-48241.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/radareorg/radare2/issues/23317", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/radareorg/radare2/pull/23318", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48900.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48900.json index e5ad6e17c6c..652ded13430 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48900.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48900.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48900", "sourceIdentifier": "secalert@redhat.com", "published": "2024-11-13T15:15:07.577", - "lastModified": "2024-11-21T18:15:10.460", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-13T00:33:54.370", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,44 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.4.0", + "versionEndExcluding": "4.4.4", + "matchCriteriaId": "8E1F89F0-D04C-41A0-89D2-C45C94F29967" + } + ] + } + ] } ], "references": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318818", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4977.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4977.json index ab54ad87e07..7d9c62240d4 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4977.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4977.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4977", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:03.440", - "lastModified": "2024-11-21T09:43:59.597", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-13T00:02:24.623", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:plumislandmedia:index_wp_mysql_for_speed:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.4.18", + "matchCriteriaId": "5E29B7C4-9C6A-44F5-810D-FC70405B8DBD" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/89791a80-5cff-4a1a-8163-94b5be4081a5/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/89791a80-5cff-4a1a-8163-94b5be4081a5/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50677.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50677.json index 67f9fd4061d..3bb02449d94 100644 --- a/CVE-2024/CVE-2024-506xx/CVE-2024-50677.json +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50677.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50677", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-06T16:15:21.117", - "lastModified": "2024-12-06T17:15:10.180", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-13T00:35:28.157", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oroinc:oroplatform:5.1.0:-:*:*:*:*:*:*", + "matchCriteriaId": "2D3C48DF-69E6-4651-A90A-5CF55518502C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ZumiYumi/CVE-2024-50677", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/oroinc/orocommerce-application", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Not Applicable" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6766.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6766.json index 0d21507e6fc..5b18b546c1d 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6766.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6766.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6766", "sourceIdentifier": "contact@wpscan.com", "published": "2024-08-06T06:15:36.047", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-13T00:16:33.187", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:getshortcodes:shortcodes_ultimate:*:*:*:*:pro:wordpress:*:*", + "versionEndExcluding": "7.2.1", + "matchCriteriaId": "39C2E1D6-CC20-4013-BE9F-E6A1107BD9F8" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/77bb1dcf-4e84-497a-955e-f3c0b649ad1c/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-42xx/CVE-2025-4228.json b/CVE-2025/CVE-2025-42xx/CVE-2025-4228.json new file mode 100644 index 00000000000..9a5ed20a68b --- /dev/null +++ b/CVE-2025/CVE-2025-42xx/CVE-2025-4228.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-4228", + "sourceIdentifier": "psirt@paloaltonetworks.com", + "published": "2025-06-13T00:15:23.233", + "lastModified": "2025-06-13T00:15:23.233", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An incorrect privilege assignment vulnerability in Palo Alto Networks Cortex\u00ae XDR Broker VM allows an authenticated administrative user to execute certain files available within the Broker VM and escalate their privileges to root." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:D/RE:M/U:Amber", + "baseScore": 4.6, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NO", + "Recovery": "USER", + "valueDensity": "DIFFUSE", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "AMBER" + } + } + ] + }, + "weaknesses": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + } + ] + } + ], + "references": [ + { + "url": "https://security.paloaltonetworks.com/CVE-2025-4228", + "source": "psirt@paloaltonetworks.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-42xx/CVE-2025-4230.json b/CVE-2025/CVE-2025-42xx/CVE-2025-4230.json new file mode 100644 index 00000000000..f8e3ef5f8b4 --- /dev/null +++ b/CVE-2025/CVE-2025-42xx/CVE-2025-4230.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-4230", + "sourceIdentifier": "psirt@paloaltonetworks.com", + "published": "2025-06-13T00:15:23.380", + "lastModified": "2025-06-13T00:15:23.380", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A command injection vulnerability in Palo Alto Networks PAN-OS\u00ae software enables an authenticated administrator to bypass system restrictions and run arbitrary commands as a root user. To be able to exploit this issue, the user must have access to the PAN-OS CLI.\n\nThe security risk posed by this issue is significantly minimized when CLI access is restricted to a limited group of administrators. \n\nCloud NGFW and Prisma\u00ae Access are not affected by this vulnerability." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:U/V:D/RE:X/U:Amber", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "USER", + "valueDensity": "DIFFUSE", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "AMBER" + } + } + ] + }, + "weaknesses": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://security.paloaltonetworks.com/CVE-2025-4230", + "source": "psirt@paloaltonetworks.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-42xx/CVE-2025-4231.json b/CVE-2025/CVE-2025-42xx/CVE-2025-4231.json new file mode 100644 index 00000000000..4ce33718f73 --- /dev/null +++ b/CVE-2025/CVE-2025-42xx/CVE-2025-4231.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-4231", + "sourceIdentifier": "psirt@paloaltonetworks.com", + "published": "2025-06-13T00:15:23.533", + "lastModified": "2025-06-13T00:15:23.533", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A command injection vulnerability in Palo Alto Networks PAN-OS\u00ae enables an authenticated administrative user to perform actions as the root user.\n\nThe attacker must have network access to the management web interface and successfully authenticate to exploit this issue.\n\nCloud NGFW and Prisma Access are not impacted by this vulnerability." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:C/RE:M/U:Amber", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "LOW", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NO", + "Recovery": "USER", + "valueDensity": "CONCENTRATED", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "AMBER" + } + } + ] + }, + "weaknesses": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://security.paloaltonetworks.com/CVE-2025-4231", + "source": "psirt@paloaltonetworks.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-42xx/CVE-2025-4232.json b/CVE-2025/CVE-2025-42xx/CVE-2025-4232.json new file mode 100644 index 00000000000..43030c94a9b --- /dev/null +++ b/CVE-2025/CVE-2025-42xx/CVE-2025-4232.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-4232", + "sourceIdentifier": "psirt@paloaltonetworks.com", + "published": "2025-06-13T00:15:23.697", + "lastModified": "2025-06-13T00:15:23.697", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An improper neutralization of wildcards vulnerability in the log collection feature of Palo Alto Networks GlobalProtect\u2122 app on macOS allows a non administrative user to escalate their privileges to root." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:D/RE:M/U:Amber", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NO", + "Recovery": "USER", + "valueDensity": "DIFFUSE", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "AMBER" + } + } + ] + }, + "weaknesses": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-155" + } + ] + } + ], + "references": [ + { + "url": "https://security.paloaltonetworks.com/CVE-2025-4232", + "source": "psirt@paloaltonetworks.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5593.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5593.json index fa654007ed3..903e99b23fe 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5593.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5593.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5593", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T16:15:36.613", - "lastModified": "2025-06-05T20:12:23.777", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-13T01:00:11.693", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,76 @@ "value": "CWE-120" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freefloat:freefloat_ftp_server:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A9C3D4BD-07C8-4E11-8B6C-6CBBA66F0725" + } + ] + } + ] } ], "references": [ { "url": "https://fitoxs.com/exploit/exploit-9e0f802ba8eab46db6ff5f0c634f96412286b66b33c50a420dd57c1329e3a20d1.txt", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.311079", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311079", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.587000", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry", + "Exploit" + ] }, { "url": "https://vuldb.com/?submit.587000", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Third Party Advisory", + "VDB Entry", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5594.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5594.json index adf858d8880..f24a39d1653 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5594.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5594.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5594", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T16:15:36.807", - "lastModified": "2025-06-05T20:12:23.777", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-13T00:58:21.617", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,74 @@ "value": "CWE-120" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freefloat:freefloat_ftp_server:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A9C3D4BD-07C8-4E11-8B6C-6CBBA66F0725" + } + ] + } + ] } ], "references": [ { "url": "https://fitoxs.com/exploit/exploit-79d290eb2c875b417f7a91769b3bb07a64f2562b57484473ef0f92808bb7dbe2.txt", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.311080", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311080", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.587009", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry", + "Exploit" + ] }, { "url": "https://fitoxs.com/exploit/exploit-79d290eb2c875b417f7a91769b3bb07a64f2562b57484473ef0f92808bb7dbe2.txt", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index 9f3517495e5..ece5d175252 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-12T23:55:18.942650+00:00 +2025-06-13T02:00:20.569928+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-12T23:54:58.770000+00:00 +2025-06-13T01:00:11.693000+00:00 ``` ### Last Data Feed Release @@ -27,36 +27,45 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2025-06-12T00:00:04.304975+00:00 +2025-06-13T00:00:04.319101+00:00 ``` ### Total Number of included CVEs ```plain -297837 +297841 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `4` -- [CVE-2025-41233](CVE-2025/CVE-2025-412xx/CVE-2025-41233.json) (`2025-06-12T22:15:20.560`) -- [CVE-2025-41234](CVE-2025/CVE-2025-412xx/CVE-2025-41234.json) (`2025-06-12T22:15:21.090`) -- [CVE-2025-4233](CVE-2025/CVE-2025-42xx/CVE-2025-4233.json) (`2025-06-12T23:15:21.983`) +- [CVE-2025-4228](CVE-2025/CVE-2025-42xx/CVE-2025-4228.json) (`2025-06-13T00:15:23.233`) +- [CVE-2025-4230](CVE-2025/CVE-2025-42xx/CVE-2025-4230.json) (`2025-06-13T00:15:23.380`) +- [CVE-2025-4231](CVE-2025/CVE-2025-42xx/CVE-2025-4231.json) (`2025-06-13T00:15:23.533`) +- [CVE-2025-4232](CVE-2025/CVE-2025-42xx/CVE-2025-4232.json) (`2025-06-13T00:15:23.697`) ### CVEs modified in the last Commit -Recently modified CVEs: `8` +Recently modified CVEs: `16` -- [CVE-2024-2260](CVE-2024/CVE-2024-22xx/CVE-2024-2260.json) (`2025-06-12T23:48:17.817`) -- [CVE-2024-29460](CVE-2024/CVE-2024-294xx/CVE-2024-29460.json) (`2025-06-12T23:54:58.770`) -- [CVE-2024-2996](CVE-2024/CVE-2024-29xx/CVE-2024-2996.json) (`2025-06-12T23:33:11.550`) -- [CVE-2024-2997](CVE-2024/CVE-2024-29xx/CVE-2024-2997.json) (`2025-06-12T23:28:31.310`) -- [CVE-2024-2998](CVE-2024/CVE-2024-29xx/CVE-2024-2998.json) (`2025-06-12T23:24:56.703`) -- [CVE-2024-3013](CVE-2024/CVE-2024-30xx/CVE-2024-3013.json) (`2025-06-12T23:23:13.000`) -- [CVE-2024-31759](CVE-2024/CVE-2024-317xx/CVE-2024-31759.json) (`2025-06-12T23:43:02.223`) -- [CVE-2025-47977](CVE-2025/CVE-2025-479xx/CVE-2025-47977.json) (`2025-06-12T23:15:21.750`) +- [CVE-2021-20587](CVE-2021/CVE-2021-205xx/CVE-2021-20587.json) (`2025-06-13T00:15:20.230`) +- [CVE-2021-20588](CVE-2021/CVE-2021-205xx/CVE-2021-20588.json) (`2025-06-13T00:15:22.797`) +- [CVE-2024-30799](CVE-2024/CVE-2024-307xx/CVE-2024-30799.json) (`2025-06-12T23:57:54.350`) +- [CVE-2024-40553](CVE-2024/CVE-2024-405xx/CVE-2024-40553.json) (`2025-06-13T00:04:08.850`) +- [CVE-2024-40554](CVE-2024/CVE-2024-405xx/CVE-2024-40554.json) (`2025-06-13T00:06:59.700`) +- [CVE-2024-40555](CVE-2024/CVE-2024-405xx/CVE-2024-40555.json) (`2025-06-13T00:08:19.140`) +- [CVE-2024-40560](CVE-2024/CVE-2024-405xx/CVE-2024-40560.json) (`2025-06-13T00:14:13.620`) +- [CVE-2024-46213](CVE-2024/CVE-2024-462xx/CVE-2024-46213.json) (`2025-06-13T00:28:54.280`) +- [CVE-2024-48052](CVE-2024/CVE-2024-480xx/CVE-2024-48052.json) (`2025-06-13T00:21:58.573`) +- [CVE-2024-48241](CVE-2024/CVE-2024-482xx/CVE-2024-48241.json) (`2025-06-13T00:24:27.273`) +- [CVE-2024-48900](CVE-2024/CVE-2024-489xx/CVE-2024-48900.json) (`2025-06-13T00:33:54.370`) +- [CVE-2024-4977](CVE-2024/CVE-2024-49xx/CVE-2024-4977.json) (`2025-06-13T00:02:24.623`) +- [CVE-2024-50677](CVE-2024/CVE-2024-506xx/CVE-2024-50677.json) (`2025-06-13T00:35:28.157`) +- [CVE-2024-6766](CVE-2024/CVE-2024-67xx/CVE-2024-6766.json) (`2025-06-13T00:16:33.187`) +- [CVE-2025-5593](CVE-2025/CVE-2025-55xx/CVE-2025-5593.json) (`2025-06-13T01:00:11.693`) +- [CVE-2025-5594](CVE-2025/CVE-2025-55xx/CVE-2025-5594.json) (`2025-06-13T00:58:21.617`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 46191ae9144..8d8308635bc 100644 --- a/_state.csv +++ b/_state.csv @@ -167243,8 +167243,8 @@ CVE-2021-20583,0,0,dfd854c02ad80c4c9284a76c0af83c54e1738f2e8aae523b7f5a4ccfe029a CVE-2021-20584,0,0,7897d41094c6ff1461b26c002b6d4c8576d5a8e6df5725789071ab85866a5742,2024-11-21T05:46:49.220000 CVE-2021-20585,0,0,0c648813b80991df88b16a534e1d1a30b2a06e2a780d25718b3870c9ffc1384e,2024-11-21T05:46:49.350000 CVE-2021-20586,0,0,e4ff2a8eb090e820504069de95096d9b2f8f7d19251df9137fdf64649af1862b,2024-11-21T05:46:49.483000 -CVE-2021-20587,0,0,2213532b8218e894b82aba8f7c0b83318adba38468a4fc4381a72562e6d74b92,2024-11-21T05:46:49.637000 -CVE-2021-20588,0,0,00252f17d0d01117cfb84f99ea42a5cefa325ffc6bf5c68d2f8340228e2309b8,2024-11-21T05:46:49.790000 +CVE-2021-20587,0,1,9aea705926a1212757620375df92fc5b8cef2c2f1b9b8597cc4b05345a5fb0d6,2025-06-13T00:15:20.230000 +CVE-2021-20588,0,1,b3cb9ecdf54a6c4ba0ec56971428d0b0700d8cfa3088c92869b82df056078a88,2025-06-13T00:15:22.797000 CVE-2021-20589,0,0,bfc5f7f0760bbae45f8f582555ee425a5ae4ae77e0859c27cce5e52a8fd93d07,2024-11-21T05:46:49.930000 CVE-2021-2059,0,0,572e4d9069bca8402dc4833f53a165543bca262aba15a93719dc84f4b9037612,2024-11-21T06:02:17.323000 CVE-2021-20590,0,0,1b3e9561d0d4ed6e5ed9f739bea4481d1bb1c0b799358400e664c3f826cd51a4,2024-11-21T05:46:50.060000 @@ -252024,7 +252024,7 @@ CVE-2024-22590,0,0,c61f02103dabd4fe4ee1e4744aa85defca93b5aa3ffb20a4fea1a1e022feb CVE-2024-22591,0,0,abf87faca2359544afd8aae57da6b1b3c01d4b19e553631d37daefe27f471c8a,2024-11-21T08:56:28.613000 CVE-2024-22592,0,0,593835b284e3483f81fda6f64e50c2a2a17d0fc8e64e321aa4ccb98ae21d9cc9,2025-06-02T15:15:31.233000 CVE-2024-22593,0,0,5096bdfca51e45974ccf7b3375156b8687c264919ecbeeea17fc6ebd6a05be56,2024-11-21T08:56:28.923000 -CVE-2024-2260,0,1,46f4ae053783a8eb33543c3d74b8dc9e5f7eee826bd500ac1e9d5e0de52f90fc,2025-06-12T23:48:17.817000 +CVE-2024-2260,0,0,46f4ae053783a8eb33543c3d74b8dc9e5f7eee826bd500ac1e9d5e0de52f90fc,2025-06-12T23:48:17.817000 CVE-2024-22601,0,0,911fc06c53591b52a66c4d8b85d7ec2c09891cf909bb76b2114fd8c5524918d1,2024-11-21T08:56:29.163000 CVE-2024-22603,0,0,5c9726a11a96b0648c53639b35fdd408a890f7fc7c068b8dcae9441c85f8ab89,2024-11-21T08:56:29.310000 CVE-2024-2261,0,0,4f6d5c9fdf0e5875b684235a52067972acad631b950e5c276c5014b4f1a0e5a5,2024-11-21T09:09:22.330000 @@ -257148,7 +257148,7 @@ CVE-2024-29452,0,0,8e1bfc2abfc91b5ca6aaff5eaf1d9a62e09db612bd6386c944cc6eed8e948 CVE-2024-29454,0,0,1c893aa9fc261c831d35b219df714ee3ff6151f3ab4ae74ce0e7125ab45089bf,2024-05-27T01:15:15.473000 CVE-2024-29455,0,0,c5766b7ace224fe7d010005c23caa8535593f35607a7498893863c39faace774,2024-05-27T01:15:15.573000 CVE-2024-2946,0,0,997d6b53bb745a8fe904139e2791e2c813b08bddcde7c3f57e212bb43a8941f1,2024-11-21T09:10:54.347000 -CVE-2024-29460,0,1,13f8eceffcee3d05acc96b208d8560083e02a8fddaa09f7082a0f77809cb469e,2025-06-12T23:54:58.770000 +CVE-2024-29460,0,0,13f8eceffcee3d05acc96b208d8560083e02a8fddaa09f7082a0f77809cb469e,2025-06-12T23:54:58.770000 CVE-2024-29461,0,0,350d0443897e6abf7e760f551fa90e7e40a7de57ad6f6e7e048339ab4a0daf3b,2025-05-27T16:03:16.460000 CVE-2024-29466,0,0,d1c8dd4175f772e9684f7c0531d839c45304893b8eb7f47c0e48698c58964c2e,2025-03-20T20:15:31.863000 CVE-2024-29469,0,0,c185a691753b377e74e3ffa745c574e83b0f5b88bb3c96fe75965fbcc7484a3a,2025-03-28T16:45:49.587000 @@ -257460,7 +257460,7 @@ CVE-2024-29956,0,0,0acd6540b410ec634d0c036a7eeea01b052653cb803090a763826c83babb0 CVE-2024-29957,0,0,70ba4c896cc1ffca005fbeb10bbf5df4d60eaee4a0adcce9c75dd93712bd8bb4,2025-02-04T15:57:57.087000 CVE-2024-29958,0,0,e451fe567cd476c43bc0f0630db35e30ff6017050f5d4cceb89cf67b8326ee25,2025-02-04T15:57:10.910000 CVE-2024-29959,0,0,fcae3e199197e6c5910135052d31e093b695f8ecbf2a65ef23567c27c9ed0128,2025-02-04T15:54:42.997000 -CVE-2024-2996,0,1,29ca11a16c9186ba1f89cf012da379c18652d939d22a1e5bbff8ba56601f8d81,2025-06-12T23:33:11.550000 +CVE-2024-2996,0,0,29ca11a16c9186ba1f89cf012da379c18652d939d22a1e5bbff8ba56601f8d81,2025-06-12T23:33:11.550000 CVE-2024-29960,0,0,c1ac4f728db0ce56b35b4096e294772b54c42cd7d34b664e438e3aa514ef1c44,2025-02-04T15:53:21.440000 CVE-2024-29961,0,0,23b6afc8546223d4c28a4d906fa3a4016e878e0ad63d9dbdb7ca8764ee1f0b1f,2025-02-04T15:52:04.420000 CVE-2024-29962,0,0,dbf23890b1871d3bb9db2a3ca3cc9d48d287d20d52088c8149445002c4144fa4,2025-02-04T15:48:07.963000 @@ -257471,7 +257471,7 @@ CVE-2024-29966,0,0,9817630004e4f9d4a0e0a788b7bffbfdf7f4d5d460d7b6913dfd628a37f88 CVE-2024-29967,0,0,7fb2da47e3e9971d0eb77a91de49cb0c3c56d22f08b4aa2f3abe35d5ef7326c4,2025-02-04T15:43:15.313000 CVE-2024-29968,0,0,76c0dcb3b20e0f30760f0738161c4405206b9ed109fb79f494d7a7769292f0e2,2025-02-04T15:41:56.900000 CVE-2024-29969,0,0,00af3b0cb31f5ed33b88c85d289859989a5d43b77c909cbc5f0dadf2c52baacb,2025-02-04T15:41:14.437000 -CVE-2024-2997,0,1,cceb838f5edf102a8560e0b8ec9e40306737e8577c51377a77438a62adb0cec4,2025-06-12T23:28:31.310000 +CVE-2024-2997,0,0,cceb838f5edf102a8560e0b8ec9e40306737e8577c51377a77438a62adb0cec4,2025-06-12T23:28:31.310000 CVE-2024-29970,0,0,30ccfc672dbcc68f9e9c530abc2a318b021327a43912d1a8fe68035e6eb0947c,2025-01-14T15:15:14.973000 CVE-2024-29971,0,0,d6ed4ef29e7bc64c3c722e51c9009928cc19e29fe2b4f6b6879ff10e2eada349,2025-01-14T15:15:15.167000 CVE-2024-29972,0,0,4a108514d84c100eb493dfdf5c25347376ba464486c11a65e2d8fef62b531d49,2025-01-22T22:39:02.917000 @@ -257482,7 +257482,7 @@ CVE-2024-29976,0,0,789fd8071a28cdb2be901c9428939891f0d07c8ed3cca40edb2767ffbebe4 CVE-2024-29977,0,0,bc0b0c3f00512826d3afc15c878e90557d1e530cdf0900ad20154e5fd854b006,2024-08-23T14:52:19.923000 CVE-2024-29978,0,0,eae448edc2ea3a52a4ea4b11b5efbbaddb66df9b1fe4c50de1f98d83d8337b9f,2024-11-26T08:15:05.353000 CVE-2024-29979,0,0,2ba88bbf68a5c6eeb590333f3bddf141b97757456435e31074be547e5e781221,2025-01-14T16:15:28.423000 -CVE-2024-2998,0,1,4820dabf195e0b621affb228dccca196dfad539c5408102e333cbef94a09ad77,2025-06-12T23:24:56.703000 +CVE-2024-2998,0,0,4820dabf195e0b621affb228dccca196dfad539c5408102e333cbef94a09ad77,2025-06-12T23:24:56.703000 CVE-2024-29980,0,0,143f2e3d7074e60173fc131618c6a699cc502fd9f45595d11d23a3cb92549894,2025-01-14T16:15:28.600000 CVE-2024-29981,0,0,d16fc1d1360856640e375dcb1119eb72495ab67c989f65978267cc9feda18cf9,2025-01-06T18:38:04.080000 CVE-2024-29982,0,0,b7498c81fb2ff5d455f3e540c394e67eb9ab63a8f012ca2dcb7099c8b4039f32,2025-01-15T19:07:20.527000 @@ -257642,7 +257642,7 @@ CVE-2024-30126,0,0,4a84f5c7cb55ea0a206c0843b0dd1c4e1cb6614b564e199815c0fb67b370e CVE-2024-30127,0,0,c2c8bc07d2be439d9efb756dbc4b2460e3dd939346c2dc8fce9c4c0b55385fad,2025-04-29T13:52:28.490000 CVE-2024-30128,0,0,f765dd0aaf2938a4ad73aeccf94f4003876d55e95a48ff57410e71dbc6342846,2024-09-26T13:32:02.803000 CVE-2024-30129,0,0,8c3dfa243fe3d9fcbf8608c332b7786f7ea3753d97eb09d24501ef00ef461d78,2024-12-06T16:15:20.777000 -CVE-2024-3013,0,1,5dcd0fd431e7a484de89cdae26abefbb32a2798133a9ebd51c713b33dc379f4d,2025-06-12T23:23:13 +CVE-2024-3013,0,0,5dcd0fd431e7a484de89cdae26abefbb32a2798133a9ebd51c713b33dc379f4d,2025-06-12T23:23:13 CVE-2024-30130,0,0,e25a8585937a7a3bfca4585089d126deeae8aa49e27e42698ea13a1ebdef6cab,2024-11-21T09:11:18.623000 CVE-2024-30132,0,0,54d98f7843dea94372252c73cd7990d839c54a6dd19fa7023c76c99fef58d5c6,2024-10-29T21:35:05.643000 CVE-2024-30133,0,0,e08425978db173a70b5a5b6cbb9315d57d44524a2c8d71711218342162ea4294,2024-11-13T17:01:58.603000 @@ -258219,7 +258219,7 @@ CVE-2024-3076,0,0,9c25a9fc980ba47dd8ff33a0dda6a4a7aeba692a5023e5a085194957609e21 CVE-2024-3077,0,0,fcbdd34b10368896e2c3c22301b222fc061a71cd9d47f461bb0e75567c8c2976,2025-01-23T19:21:44.207000 CVE-2024-3078,0,0,f23febdf123fb1167e6d15c44d9f90ae5c695a87735eb2afb067ff82e8b10873,2025-05-07T16:29:10.603000 CVE-2024-3079,0,0,1bb74d40e37f82d88a8767e40d33c9e3ded28d80bc3a1cc49cb882442f6d019c,2024-11-21T09:28:51.060000 -CVE-2024-30799,0,0,ca56593e05e1d1f711233eff9f777b2bfcf4346690318103f9bbe32f925593d1,2024-11-22T19:15:06.147000 +CVE-2024-30799,0,1,bdbe1dfef54b6cb848cb627899b53a6c6beea052ef9c864c72e8c525873ef8b3,2025-06-12T23:57:54.350000 CVE-2024-3080,0,0,070aacb71b634d12e4ba0fafb4ce67c446ce6fd55213f6bff03a7449066b3ede,2024-11-21T09:28:51.213000 CVE-2024-30800,0,0,88d325047f6af6b8e6cb9e48693b94ef112e1ee0e71f463cccc6a18f5927bfea,2024-11-21T09:12:25.323000 CVE-2024-30801,0,0,e570de42f0e688c69f7fb21f607c38cea88e0f782d8d60315b701902099d0ffc,2024-11-21T09:12:25.543000 @@ -258894,7 +258894,7 @@ CVE-2024-31750,0,0,f96eb8e3bbed78e55e09766d655b63a754ae5a7049972e728e16ce77deb48 CVE-2024-31755,0,0,71bb3aeb22181c517b85e9c0b60741c7bd35507479d56fe5a7b173dda191453a,2024-11-21T09:13:50.943000 CVE-2024-31756,0,0,0934d41af4d2a8096bf6b79ceb165d1d21a8cb15b32982d5c5355673185c396f,2024-11-21T09:13:51.160000 CVE-2024-31757,0,0,827ecdaa9dc7f88a37dfd8f4c09903a5f5a9992b64bc40c5e964ac858799f717,2024-11-21T09:13:51.390000 -CVE-2024-31759,0,1,05e1f4131e61d4f0ada0c5e7d6b8aab829a17b3404edb68b414001697214f750,2025-06-12T23:43:02.223000 +CVE-2024-31759,0,0,05e1f4131e61d4f0ada0c5e7d6b8aab829a17b3404edb68b414001697214f750,2025-06-12T23:43:02.223000 CVE-2024-3176,0,0,27a04eebf265d5fa44ca459fa9ee91294b6639de28ee4ae4e04d02d9ff474005,2025-03-17T18:15:17.473000 CVE-2024-31760,0,0,846edb2553b07f2b445cf5a1e8b93556b5dd0398d01eaf96f4b7929dfecd0756,2024-11-21T09:13:51.833000 CVE-2024-3177,0,0,5bf72b0bc06971896d316946ec2a45f35a4b8a5d69e19bb6025aca04738c4b7c,2024-11-21T09:29:05.083000 @@ -265722,11 +265722,11 @@ CVE-2024-40549,0,0,71c3a5884cf17c3b292c0c7d286869bbc97b2576bff775ffd252aa8bf9aac CVE-2024-40550,0,0,a13954525ea3f13e0e64b2179d0e02870dcf760eb3ad45f4b98498ef695c9c99,2024-11-21T09:31:18.393000 CVE-2024-40551,0,0,e53419336a3d2c393845f5829ecc41733ce5d4b798a82e0e65d6e268030c2d9a,2024-11-21T09:31:18.603000 CVE-2024-40552,0,0,ae4f61ed4aa8d7c5fa333dae45cde375a2549b7a662e9b346bf709302a1e9db8,2025-03-26T20:15:20.707000 -CVE-2024-40553,0,0,ef316f1d56715054a491a30c2db5feaeee5b52fe9d91e10e7e5b78aaa0cba4e1,2024-11-21T09:31:18.923000 -CVE-2024-40554,0,0,39ceb4b2e282d5c17582588a81700778a32dcdc63f2657146966bb85c962c7a5,2024-11-21T09:31:19.117000 -CVE-2024-40555,0,0,290d00135c3882fd8b96f06a86389c021b8eb7bf68d142326425cf7d97032ba4,2024-11-22T19:15:06.943000 +CVE-2024-40553,0,1,7eea52c2f8e439d2a264ad8548723958806e8137610d6f514e4d52102597995c,2025-06-13T00:04:08.850000 +CVE-2024-40554,0,1,5d5c5c2cf162fb9ebc25ddd204c2e4ac2ba23b7c425e13967cbf659595b188e1,2025-06-13T00:06:59.700000 +CVE-2024-40555,0,1,4f6aca333b540d8e0a75160dc56aff1ebfd02c6fcf0650f8c968a0e07d9b22ae,2025-06-13T00:08:19.140000 CVE-2024-4056,0,0,d578d896482bad42a689f24bb727d093d89b4e4ad9a16137115268e371c35506,2024-11-21T09:42:05.970000 -CVE-2024-40560,0,0,4df2ceb4f41adf8cf666410bb966237766648fac71bacffbfa433d4c66c2109b,2024-11-21T09:31:19.433000 +CVE-2024-40560,0,1,5660f8017263b57237c32db3371c0082be9a5828de973f81d34560f70ae95cbe,2025-06-13T00:14:13.620000 CVE-2024-40568,0,0,c12c8f080192deabb173a3181ef7b218c84c4523adbfc6eb7f73c288b6931903,2024-09-20T12:30:17.483000 CVE-2024-4057,0,0,ba7fe553b438d2b224d9d6e5f235b3ee1bb06fdbaf87fbbf24de464c203e2672,2025-05-21T19:10:32.567000 CVE-2024-40575,0,0,8f8f60ae0654b2cb189f518e1a74f4f9151a1448954bee799fbc3bd704a3ffa6,2025-03-18T14:15:39.260000 @@ -270073,7 +270073,7 @@ CVE-2024-46209,0,0,d3bbc915447ec1fe735ec63d5553d0fa25a7e9df2ec6f6285302779d3f6b2 CVE-2024-4621,0,0,b9797f219d024d908699660241169113490d175831cdc6cf05e0f2b4b5428339,2025-05-01T19:46:27.260000 CVE-2024-46210,0,0,dd0259ca7d3b357c4120cf4dc5f3010d93adc7f5a3403c8d9782eaa71d816fad,2025-01-31T17:15:13.950000 CVE-2024-46212,0,0,9fb6a248b9aee6c6623aaaed9592269e8faf25b72106f535b7602ba05dd43c74,2024-10-18T12:53:04.627000 -CVE-2024-46213,0,0,14e6aca58c78f4091257ec1bdfcf4f32aabc7fd46f373f1f42d1b8882c20a13c,2024-10-18T12:53:04.627000 +CVE-2024-46213,0,1,e8d005be929efffbf7a3a6d4dc420a10859e47c5da743f0b11ad04b5e7652201,2025-06-13T00:28:54.280000 CVE-2024-46215,0,0,fe5702e9b51c58e432fa7fecc93685ecce003d70c9e7155da8f03da1e9c41964,2024-10-15T21:35:30.590000 CVE-2024-4622,0,0,23626a2d23de89416eb6f3e5f72e3392ef600a48bdf20a3fbfd212329cf56b8e,2025-03-27T16:15:27.163000 CVE-2024-46226,0,0,c0cdc9f66887753e84142ab4c1bfeab26a435bd0ec33b3255c2d522705ad303c,2025-04-07T18:52:11.070000 @@ -271583,7 +271583,7 @@ CVE-2024-48048,0,0,a97f7ada1c5aaf8df54082eb88b9dfacd58ec4c81aca77d5cdf908f50642b CVE-2024-48049,0,0,44d628a1eb8f855e4d625cdaa49c33b7e84051ea78a51483f0e723cb2dcbe66a,2024-10-23T16:12:12.127000 CVE-2024-4805,0,0,93a656f3ef0420cc8656281fbe063af8c1d24a62891b64e6c9034267d927db57,2025-02-11T18:29:28.423000 CVE-2024-48050,0,0,2526aa2b45f0900ba490f81f2aae96cf98ae8e11e46739550d124ed38d03df73,2024-11-06T21:35:07.863000 -CVE-2024-48052,0,0,9fba2065f46f7e67be083b8d8efce9358fc327a0292fa98dcbc32b7499d176c1,2024-11-06T20:35:29.830000 +CVE-2024-48052,0,1,6e0e10a7a1e22c19ee55cbdb4219ebc5987fc86d75fe8beb78a54cd39203285f,2025-06-13T00:21:58.573000 CVE-2024-48057,0,0,854d29e18299ec9a1432f3ae60c1d2f8a2a34c19fade5fa224384e18ef65d8b1,2024-11-05T18:35:10.987000 CVE-2024-48059,0,0,e3f8f61737f0f9774697a61977452d4dae1cbee369a51fc5b18151dbe27d571a,2024-11-05T22:35:11.853000 CVE-2024-4806,0,0,c24a2ce3dd8e70c6a1052478b7de9c33f0214d0df368bae6e15d075a67c1b546,2025-02-11T18:29:14.440000 @@ -271675,7 +271675,7 @@ CVE-2024-48237,0,0,0c77a24001e55d3115e663aa0aaa2117eada9184bbe35e280e7227bad6fdf CVE-2024-48238,0,0,369469fb90866b16e049137a96b36fde2d8ada2e645c31012efe26d150a3ca76,2025-04-17T18:59:35.273000 CVE-2024-48239,0,0,150999466b9913bb39d725025f345b709775b852cf8ae7b1e5357c6269e9f116,2025-04-17T18:56:59.167000 CVE-2024-4824,0,0,99e5c25e3efbae2d6155cb78a769b081c4e63979dfca195378dce1a55688edc2,2024-11-21T09:43:41.940000 -CVE-2024-48241,0,0,942b4afc357baeaceadf6e602d4d8e3bfa0474bc4cebfcbfe23fbed098a739b4,2024-11-01T12:57:03.417000 +CVE-2024-48241,0,1,117d0e0a3ba0b329464213b66039261a0e77180dc4e5934e73fdd19266cb9118,2025-06-13T00:24:27.273000 CVE-2024-48245,0,0,24922a2d7e07e6658bda8116d06f7d7a042d2aff2acd1eb5bf13301caf6d9893,2025-05-14T16:06:12.270000 CVE-2024-48246,0,0,9e54d8ae569997b2da7f9b0bd6618b2d7111ed51e20372574de285e89a2b6c23,2025-05-21T15:34:19.317000 CVE-2024-48248,0,0,bfaaa427608ee7a1887b41f59bd89b64643bcbb880eb573595b1a553986426d5,2025-03-25T18:48:31.753000 @@ -271988,7 +271988,7 @@ CVE-2024-48897,0,0,f3182141722d6be3bdc9aba61fbb38fd1908803d90d823ef2ab33a0e64cdc CVE-2024-48898,0,0,2bbe84de4ba6be3ab03f78825e1f154bca82574585a617dc37898b47a2165c1c,2024-11-20T14:46:16.237000 CVE-2024-48899,0,0,eb76319bd18f01b7503dd2a2f3856ff3104244a68e1129e9428c69469b9ae487,2025-06-02T15:36:03.710000 CVE-2024-4890,0,0,6e589fdb6077c4e188ee9995a9f88a600abbe14c9e8cdba14f2d7418747caae1,2024-11-21T09:43:48.113000 -CVE-2024-48900,0,0,906a3971f953f9efb237a78dcf4f276b0eb327f92bdc6728147ee1acc8f7a2f1,2024-11-21T18:15:10.460000 +CVE-2024-48900,0,1,e5741ed69add8f97d4353b5f138e2f391b7c60e7336735fcd26a443e0d30a4ad,2025-06-13T00:33:54.370000 CVE-2024-48901,0,0,71a32a44c0ef4ae7be4ebee83c1da9cd9051ae7f4725178587fe5cc4d9f33740,2024-11-20T14:45:10.380000 CVE-2024-48902,0,0,fac907ba592985cedbc6c7d62d6399de126c11c59cc432f7434b088369952c3f,2024-10-16T16:57:23.463000 CVE-2024-48903,0,0,49fdfa095e9ba18ef9d33ae5dbb85500094116df8d52da97c48eb1a137b560a0,2025-03-13T14:15:32.560000 @@ -272690,7 +272690,7 @@ CVE-2024-49766,0,0,9293ee2c0e977752a03fa95c9f6ffc14dfd362cad2bd4e82d4b3e3936ed5b CVE-2024-49767,0,0,65633cbaa7e1575f6d90b96e625045f51346ad943fc9deac02f5dce675e8675b,2025-01-03T12:15:26.257000 CVE-2024-49768,0,0,f42149a947b9e6a9df44e097df1a7cbc9a84f232e5092fba26854faae247d400,2024-11-07T17:28:02.853000 CVE-2024-49769,0,0,236a5de10e245676abd4e56a87000acf7227e0ad3f0804fa300b288d259df1fe,2024-11-21T09:41:49.443000 -CVE-2024-4977,0,0,21af71e7a2cf26f44bedd7736257ef5f1632363146a389d63b714b5416af507f,2024-11-21T09:43:59.597000 +CVE-2024-4977,0,1,d821244fa6a2f69003ca3ba16e6e54dfd89961d1ae22eb872f024d5dc29caa70,2025-06-13T00:02:24.623000 CVE-2024-49770,0,0,8616f0e6e6f5ee633f90ccf399fc35ba693a589bdcd4054ddef0f3c8ec957161,2024-11-01T20:24:53.730000 CVE-2024-49771,0,0,8c6be80f6c66464327581fe20dca305196ea80220132086a57a1f206da8b3bfd,2024-10-29T14:34:50.257000 CVE-2024-49772,0,0,32b7e95857890df8c85cd4e02aad79ee44554209662330cf7f8cc7a1c9ccfb02,2024-11-13T20:19:54.597000 @@ -273609,7 +273609,7 @@ CVE-2024-50667,0,0,3b2228d5805eb7f24398eb0494f5bf949bcc12d73d945bfde4b91a49f82fd CVE-2024-5067,0,0,1b5c70fd6aa8a713385c4f1e29f8c71eeaa98648b5736e6e39376f75e3abb922,2024-11-21T09:46:53.810000 CVE-2024-50671,0,0,99782c17088a8d91d172d01f5a082085329526fd6f7189288ae0f91a8aaa1a9a,2024-12-04T17:15:14.860000 CVE-2024-50672,0,0,a506f4d2b4e62571040ff3dd4b935bbaea397a7aabe2668687c8152c3cc151d7,2024-11-27T17:15:12.563000 -CVE-2024-50677,0,0,5f636a99c7704b7aa1bd0744ae40d212a5ec12b70cab5081ae39c2cc98943598,2024-12-06T17:15:10.180000 +CVE-2024-50677,0,1,723fb15f9de6b325f3887ee4e5c3bf4eff6d2c38d5cbfe8a7194feab4a03ee93,2025-06-13T00:35:28.157000 CVE-2024-50684,0,0,cb4ec550b06395fe76d03028f59046b8ca95e5449f0c8b23214661474b2ea854,2025-04-07T18:51:59.260000 CVE-2024-50685,0,0,d1f6c86d98cb742624cc284cb8052fd9cb180286a11d2d3ca0ab743823da9fa2,2025-04-07T18:51:55.053000 CVE-2024-50686,0,0,52e4157c3eb30e685fb9ee416f9fca289dd7b41a5c8cadd1bcef667a01098287,2025-04-07T18:51:50.390000 @@ -279390,7 +279390,7 @@ CVE-2024-6761,0,0,f38b3ccdc89aa0093bd659ba31741817a9ff74cb3bee1ce8404957bf0a35b5 CVE-2024-6762,0,0,18690a6aa399969d81c352c88449cf6232694cd617037dfea2e7d34ee651a81a,2024-11-08T21:29:51.237000 CVE-2024-6763,0,0,fbb7a9fc4e7fc1b130680cf78a7623e5b6152c7321412c2f0ae8446694405210,2025-03-07T01:15:11.793000 CVE-2024-6765,0,0,582116fb1612a7c43e0b570dc3dd773f185a6bed827d147d00793764d2f2774e,2024-07-17T14:15:04.327000 -CVE-2024-6766,0,0,dc8ecbb0b1e47eec3565e2404db269c00a7800abc0dcce313d6dc0483691a1de,2024-08-06T16:30:24.547000 +CVE-2024-6766,0,1,2a7fe79e277d1967138e7a13c233b8c4a45a1957231f1b18a2385a738f052530,2025-06-13T00:16:33.187000 CVE-2024-6767,0,0,f769e30490d66d8fac295ebcef2fe317bfce217d66064d303b66800281e266c9,2024-08-21T12:30:33.697000 CVE-2024-6768,0,0,c9b849fa2708028c983ea26f499bccf85a66f3b6f4293085d3d2f94306290631,2024-08-13T12:58:25.437000 CVE-2024-6769,0,0,0ac0cfe1e10010a7138bf316346b2b55c6552382ac5f9f38dcfd36dab99a6396,2024-11-21T09:50:16.560000 @@ -294476,8 +294476,8 @@ CVE-2025-4123,0,0,b273a1b485cb3feb197a6a9855fd98a99a47d7d21e024b2df7154800bc33c4 CVE-2025-41230,0,0,0c25a26a651e10ec85f6e769a1a9cc82bb8d12716df24840e46d82d1d274c1bc,2025-05-21T20:25:16.407000 CVE-2025-41231,0,0,e30b6f8b7576282583867252dd43d1bf6e7ecb42918ca5f72a9a1aca432764d0,2025-06-12T16:22:47.783000 CVE-2025-41232,0,0,517310e679218fd1f22e7e0fd08cf56e44290e9febf8e46b848de21769620f54,2025-05-21T20:24:58.133000 -CVE-2025-41233,1,1,6b8247cb02fbf912230c4061bdcbca5c903b79312c9696c12091ffa56735653a,2025-06-12T22:15:20.560000 -CVE-2025-41234,1,1,49e580f1b467749711b12e94dfd5ceaa9e4f722e6c04db5dbd1603fbd5bb0cd3,2025-06-12T22:15:21.090000 +CVE-2025-41233,0,0,6b8247cb02fbf912230c4061bdcbca5c903b79312c9696c12091ffa56735653a,2025-06-12T22:15:20.560000 +CVE-2025-41234,0,0,49e580f1b467749711b12e94dfd5ceaa9e4f722e6c04db5dbd1603fbd5bb0cd3,2025-06-12T22:15:21.090000 CVE-2025-41235,0,0,d4d8945eb1b378e0ed66f8c1428c86eda4f61188221c7cba9d8ecf68b09b94fa,2025-05-30T16:31:03.107000 CVE-2025-4124,0,0,2116d33601d18584d8ff86788e21befdf79ee067b30d9afca370ae97d0f6cb63,2025-05-16T16:56:49.807000 CVE-2025-4125,0,0,9ce360e53c445df2b459e99f4cc1a32fbf05cb06f761d7887ca2ad1edf5cdba7,2025-05-16T16:56:47.173000 @@ -294613,7 +294613,11 @@ CVE-2025-4222,0,0,0ac402cc845bab4a30e9252ea588813619c6f19618452a717b52c67067208b CVE-2025-4223,0,0,956f48551f11f91b052ecedb14a153aceab464c078b4bc0b79be148ceb74f438,2025-05-28T14:58:52.920000 CVE-2025-4224,0,0,1207737d79a1e90fb6c077a6a1097540732fecbc5b6d096024f04eb01ab32d8d,2025-06-04T14:54:33.783000 CVE-2025-4226,0,0,553848fc8965850ce01d7354687a65a57c667ad58d4e47460cbb85b0387517fd,2025-05-30T10:15:23.343000 -CVE-2025-4233,1,1,029195bf86c0a284db68d98fa17451ac3fdbea3e5c1a40c505f5236175313bb3,2025-06-12T23:15:21.983000 +CVE-2025-4228,1,1,554b1a6f1624f5ff21aabcc2ba5fe6664bfd45b472d87eab77b50fd6cdf9b337,2025-06-13T00:15:23.233000 +CVE-2025-4230,1,1,3bc7d43f6ed17d0222050d5e2a8c149fcb80dc001be4c3f44b9fc2d5f7403e5e,2025-06-13T00:15:23.380000 +CVE-2025-4231,1,1,9f35b2b6570c87e4ea9cfe7424c6a624299304be5429d17ab099d4079abf7e0b,2025-06-13T00:15:23.533000 +CVE-2025-4232,1,1,7c0d7848e06aeb2ed299e7649a2baf502414476df4b217dd96bdb218f0ad26fa,2025-06-13T00:15:23.697000 +CVE-2025-4233,0,0,029195bf86c0a284db68d98fa17451ac3fdbea3e5c1a40c505f5236175313bb3,2025-06-12T23:15:21.983000 CVE-2025-4236,0,0,4a998b3d009e2e5b8d6c745dec0a05483fadfb16e9111b778387c6694f340a68,2025-05-16T15:04:03.170000 CVE-2025-4237,0,0,6e9102316b2d9622f5dbc1640c375fa9a5bfea77a1257bb79b559d426c098991,2025-05-16T15:03:54.820000 CVE-2025-4238,0,0,4c32d3f4362fe39e2d2da40a1702743e497b428c81eff7b7cd5a815f44e86b4b,2025-05-16T17:31:59.303000 @@ -296453,7 +296457,7 @@ CVE-2025-47966,0,0,9af6a33a751a4e930e5be1495300477ca1b17cde2c86ba4e4a2e9e219bcd8 CVE-2025-47968,0,0,9873a05770c354442bf3bf27c8a92251f359bb37d069f641052bb9259afd6d63,2025-06-12T16:06:29.520000 CVE-2025-47969,0,0,0e0e7b75223041c5dbcc523eb2d30156bba76ff3a1b7b7da0774106a4c0a4009,2025-06-12T16:06:29.520000 CVE-2025-4797,0,0,7955c65d02ae59cf8e91f669d1ef33f935d7dc4278caacac2c860c6a07f32d1d,2025-06-04T14:54:33.783000 -CVE-2025-47977,0,1,d894bcd678ce2e1999caa77e733bd06366307de4085e92553562af309f75f38a,2025-06-12T23:15:21.750000 +CVE-2025-47977,0,0,d894bcd678ce2e1999caa77e733bd06366307de4085e92553562af309f75f38a,2025-06-12T23:15:21.750000 CVE-2025-4798,0,0,5a239835fd6b5e28a8ee62e1d59407fcaa00b3515f6181c70d072abba12c6641,2025-06-12T16:06:20.180000 CVE-2025-4799,0,0,e64652d71ac1ccd82a0f39bce94f4578f980ed5ddbfde3f8e1c7d8e5c6d31bc4,2025-06-12T16:06:20.180000 CVE-2025-4800,0,0,9318c6df70d36b773d7fc889153c4ccced0bd2fc6ace455b4d54f9e1c185a4a9,2025-05-28T15:01:30.720000 @@ -297550,8 +297554,8 @@ CVE-2025-5583,0,0,b2ce656eeaab700a8a0873a3d565fbebe88a85c216d85c69e76524b9646991 CVE-2025-5584,0,0,554122312ccf631b36ad0ef789707a593ded0bc038e2cac6c090436b66fd53f2,2025-06-10T15:10:06.207000 CVE-2025-5586,0,0,b91049de82efb55ef679cf10931aa4f56290c24a8f2fbf45be0281fcede07341,2025-06-06T14:07:28.330000 CVE-2025-5592,0,0,36c388f33c323490a93ebd79d5f124d5f4fdc10d946cc1144d6e587fb6694158,2025-06-09T15:02:45.030000 -CVE-2025-5593,0,0,2fc870a522f11936dac0dea9ff39b04ab227f9c952baf080bcd9f5e32f30e2b0,2025-06-05T20:12:23.777000 -CVE-2025-5594,0,0,b27966499bfacb8dd28a0b76f2459af0a87ee57098cc25d08139feded7c76259,2025-06-05T20:12:23.777000 +CVE-2025-5593,0,1,6df395e5fe3476beb67761792da6574eda83b6d9a337db7d77d384194417b8ee,2025-06-13T01:00:11.693000 +CVE-2025-5594,0,1,83e7fdcfac2ba201d4fe551d7608819296af218dfeb5718bd91a2cdb5f7cbdd0,2025-06-13T00:58:21.617000 CVE-2025-5595,0,0,6fd2895568ff74e54f1725927ad75de212a244c65c2887bf2aa1787076195717,2025-06-05T20:12:23.777000 CVE-2025-5596,0,0,82e23e549f21aaf09e5e1c4b088111b178830006f56637c5b165470eaca69f89,2025-06-05T20:12:23.777000 CVE-2025-5597,0,0,c6542e113819d36b9ca3595ae5f78250394d8b05f7ccd0ada2c6c9bddae0ce68,2025-06-04T14:54:33.783000